bcryptprimitives.dll

Description: Windows Cryptographic Primitives Library

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.5438

Architecture: 32-bit

Operating System: Windows NT

SHA256: 270b79643a27f11bf8793cc47fd12e4c

File Size: 375.5 KB

Uploaded At: Dec. 1, 2025, 7:53 a.m.

Views: 9

Exported Functions

  • GetAsymmetricEncryptionInterface (Ordinal: 1, Address: 0x10930)
  • GetCipherInterface (Ordinal: 2, Address: 0x2a8f0)
  • GetHashInterface (Ordinal: 3, Address: 0x158a0)
  • GetKeyDerivationInterface (Ordinal: 4, Address: 0x317d0)
  • GetRngInterface (Ordinal: 5, Address: 0x2ae20)
  • GetSecretAgreementInterface (Ordinal: 6, Address: 0x2b5f0)
  • GetSignatureInterface (Ordinal: 7, Address: 0x2ac80)
  • MSCryptConvertRsaPrivateBlobToFullRsaBlob (Ordinal: 8, Address: 0x2cf30)
  • ProcessPrng (Ordinal: 9, Address: 0x1b430)
  • ProcessPrngGuid (Ordinal: 10, Address: 0x3c8d0)

Imported DLLs & Functions

api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x1005a000)
  • SetLastError (Address: 0x1005a004)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x1005a00c)
api-ms-win-core-io-l1-1-0.dll
  • DeviceIoControl (Address: 0x1005a014)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x1005a024)
  • GetModuleFileNameW (Address: 0x1005a020)
  • GetModuleHandleExW (Address: 0x1005a01c)
api-ms-win-core-memory-l1-1-0.dll
  • VirtualAlloc (Address: 0x1005a030)
  • VirtualProtect (Address: 0x1005a034)
  • VirtualQuery (Address: 0x1005a02c)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x1005a048)
  • GetCurrentProcessId (Address: 0x1005a03c)
  • SetThreadStackGuarantee (Address: 0x1005a040)
  • TerminateProcess (Address: 0x1005a044)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x1005a050)
  • QueryPerformanceFrequency (Address: 0x1005a054)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x1005a06c)
  • RegEnumKeyExW (Address: 0x1005a060)
  • RegOpenKeyExW (Address: 0x1005a05c)
  • RegQueryInfoKeyW (Address: 0x1005a064)
  • RegQueryValueExW (Address: 0x1005a068)
api-ms-win-core-synch-l1-1-0.dll
  • DeleteCriticalSection (Address: 0x1005a07c)
  • EnterCriticalSection (Address: 0x1005a074)
  • InitializeCriticalSection (Address: 0x1005a080)
  • LeaveCriticalSection (Address: 0x1005a078)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemInfo (Address: 0x1005a088)
api-ms-win-core-xstate-l2-1-0.dll
  • GetEnabledXStateFeatures (Address: 0x1005a090)
api-ms-win-eventing-provider-l1-1-0.dll
  • EventRegister (Address: 0x1005a0a4)
  • EventSetInformation (Address: 0x1005a0a0)
  • EventUnregister (Address: 0x1005a09c)
  • EventWriteTransfer (Address: 0x1005a098)
ntdll.dll
  • _alloca_probe (Address: 0x1005a10c)
  • _vsnwprintf (Address: 0x1005a108)
  • _wcsicmp (Address: 0x1005a100)
  • EtwGetTraceEnableFlags (Address: 0x1005a0d8)
  • EtwGetTraceEnableLevel (Address: 0x1005a0e8)
  • EtwGetTraceLoggerHandle (Address: 0x1005a0e4)
  • EtwRegisterTraceGuidsW (Address: 0x1005a0f8)
  • EtwTraceMessage (Address: 0x1005a0dc)
  • EtwUnregisterTraceGuids (Address: 0x1005a0e0)
  • memcmp (Address: 0x1005a110)
  • memcpy (Address: 0x1005a114)
  • memmove (Address: 0x1005a0f0)
  • memset (Address: 0x1005a118)
  • NtClose (Address: 0x1005a0b8)
  • NtOpenFile (Address: 0x1005a104)
  • NtOpenKey (Address: 0x1005a0b4)
  • NtQueryInformationProcess (Address: 0x1005a0c0)
  • NtQueryValueKey (Address: 0x1005a0bc)
  • NtTerminateProcess (Address: 0x1005a0fc)
  • qsort (Address: 0x1005a0d0)
  • RtlAllocateHeap (Address: 0x1005a0ac)
  • RtlFreeHeap (Address: 0x1005a0b0)
  • RtlGetCurrentProcessorNumberEx (Address: 0x1005a0c8)
  • RtlImageNtHeader (Address: 0x1005a0cc)
  • RtlInitUnicodeString (Address: 0x1005a0ec)
  • RtlUnhandledExceptionFilter (Address: 0x1005a0f4)
  • RtlUnwind (Address: 0x1005a0d4)
  • wcscpy_s (Address: 0x1005a0c4)